Mile2 Cybersecurity Certifications

Cybersecurity Certifications

Jacob Mannon

Forum Replies Created

Viewing 15 posts - 1 through 15 (of 58 total)
  • Author
    Posts
  • in reply to: OCU C)SP B Week 05 Devotion #100316
    Jacob Mannon
    Participant

    This verse reminds me of Isaiah, “For my thoughts are not your thoughts, nor are your ways My ways, says the Lord. For as the heavens are higher than the earth, so are My ways higher than your ways, and My thoughts than your thoughts” (New King James Version 2020, Isaiah, 55:8-9). We need to seek the righteousness of God and not the ways of the world. When we look around us, we see clearly that the world is corrupt, and its people bring nothing but death and sin upon each other. It is when we follow God’s will because His ways are indeed higher than our ways that we find peace in His presence through our King Jesus.

    -Jacob.

    in reply to: OCU C)SP B Week 05 Lesson 11 Discussion #100310
    Jacob Mannon
    Participant

    Braden,

    I think you provided an excellent combination of examples. There is not any one particular thing a company can do in order to secure data. It takes multiple approaches and methods like the data protection policies, employee training and access controls to create a more well-rounded approach to data security.

    -Jacob.

    in reply to: OCU C)SP B Week 05 Lesson 10 Discussion #100309
    Jacob Mannon
    Participant

    Jason,

    I like that you mentioned training employees to recognize scams. My current company sends out monthly scam emails to the staff to test and see whether or not we recognize them and report them to the I.T. department as phishing or scam emails. I feel that many staff in many companies do not check their email on a regular enough basis to even know whether or not they are receiving spam emails.

    -Jacob

    in reply to: OCU C)SP B Week 05 Lesson 11 Discussion #100282
    Jacob Mannon
    Participant

    When it comes to making sure we have a strong security program there are different policies we need to consider. Classifying our data is an important policy to have. Security objectives of the company and compliance standards are also necessary to keep data secure. An access control policy will be necessary. We do not want just anyone to have access to all of the company’s data. We also need to ensure that we have strong password requirements for the network. We will also need to have an incident response policy to keep operations flowing in the event of issues arising.

    -Jacob.

    in reply to: OCU C)SP B Week 05 Lesson 10 Discussion #100281
    Jacob Mannon
    Participant

    Today we face many issues such as cyberattacks, phishing, vulnerabilities in software, insider threats, ransomware, malware, and many others. We can do our best to lower the risks in our company and reduce vulnerabilities with things like multi-factor authentication, security awareness trainings, encryption, utilization of the least privilege principle, DLP strategies and penetration testing on our software. Nothing in life is perfect, but we can try and lower risk where we can and make our companies safer and more secure.

    -Jacob

    in reply to: OCU C)SP B Week 04 Devotion #100214
    Jacob Mannon
    Participant

    Temptation of sin is the biggest struggle that all people go through. There are times when I feel like giving in, but then I remember the things in my life that the Lord has brought me through. Knowing that the Lord is with me when I am struggling helps to overcome temptation. Psalm 23 is a great reminder that the Lord is with us in our best times as well as our worst. He is our guide and teacher. He is the One who brings us restoration. Even when we may be struggling to a point death, He is still with us. These lessons from Psalm 23 are things that I keep in mind when I personally struggle.

    -Jacob

    in reply to: OCU C)SP B Week 04 Lesson 09 Discussion #100213
    Jacob Mannon
    Participant

    Amy,

    I think you did a good job explaining cryptographic keys. I like your example of emails. It seems that phishing and email scams are so common now that having encrypted emails is almost a must. Everyone has to protect their data and web usage, so encryption is an excellent tool to have.

    -Jacob

    in reply to: OCU C)SP B Week 04 Lesson 08 Discussion #100212
    Jacob Mannon
    Participant

    Braden,

    I think you did a great job covering access controls. I like the idea of Role Based Access Control since not everyone in a company needs access to all of the available resources. An HR personnel member isn’t going to need access to patient medical records in a hospital, so having role-based access in place is a phenomenal idea.

    -Jacob

    in reply to: OCU C)SP B Week 04 Lesson 09 Discussion #100174
    Jacob Mannon
    Participant

    Cryptography is incredibly valuable because it allows for us to take data and hide it while it is moving from one place to another. The value is that it is scrambled or moved around and then sent to its destination where it can then be turned back into its original message. The point of this is to help prevent attackers from stealing data from the network while it is in transit. The main types of encryptions are symmetric, asymmetric, and data hashing. The differences are that symmetric will use the same key that was used to encrypt the message to decrypt it. Asymmetric encryption will require two different keys to decrypt the data. Hashing is where a piece of data is put through an algorithm and is then sent to its destination.

    -Jacob

    in reply to: OCU C)SP B Week 04 Lesson 08 Discussion #100156
    Jacob Mannon
    Participant

    When it comes to securing company data, there are multiple approaches that can be taken depending on the situation. A secure coding principle known as least privilege is a good example. We want to limit access to data and applications to those who should have an actual need to access them. Encrypting our data is another good control to protect data. Making sure that our applications, OS and security software are all updated to the newest version can help secure data. Having policies in place to protect data is necessary and useful because we don’t want account information available for everyone. I don’t want my banking information to be easily accessible to the public, so the bank has to make sure that my password protected account is not accessible by anyone other than me. This same principle can be applied to Intel. Intel doesn’t want AMD or other companies to know what their latest projects are for the newest CPUs, so they protect their information so that hackers don’t steal their products.

    -Jacob

    in reply to: OCU C)SP B Week 03 Devotion #100029
    Jacob Mannon
    Participant

    2 Chronicles 7:14 “and if My people who are called by My name humble themselves and pray and seek My face and turn from their wicked ways, then I will hear from heaven, forgive their sin, and heal their land.” God teaches us in the Old Testament that if we depend on His strength and power and not our own, we will be forgiven and healed. In order to do that we need to humble ourselves and repent of our sins and accept Jesus as our savior.

    -Jacob.

    in reply to: OCU C)SP B Week 03 Lesson 07 Discussion #100028
    Jacob Mannon
    Participant

    Braden,

    I think you did a good job discussing security controls. I like firewalls and would like to learn more about proxy servers. Using a server to prevent you from getting direct access to the websites you utilize seems helpful in preventing unwanted viruses.

    -Jacob

    in reply to: OCU C)SP B Week 03 Lesson 06 Discussion #100027
    Jacob Mannon
    Participant

    Braden,

    I think you did a great job covering different storage methods. I think RAM storage is very important to consider when looking at a new computer. I was working on my mother in law’s computer recently and it appeared to have a virus that was using all of the system’s RAM. It was to the point that the computer took several minutes to load simple things like google chrome. The computer only had 8 gigabytes of RAM available to start with. I personally think 16 to 32 gigabytes of RAM is a good amount to have. You should be able to complete the majority of your tasks without the computer slowing down.

    -Jacob

    in reply to: OCU C)SP B Week 03 Lesson 07 Discussion #99996
    Jacob Mannon
    Participant

    Two of the biggest network controls that come to mind are encryption and firewalls. Requiring access to the network will help put a barrier between just anyone with an internet connection and those who are actually supposed to be on the network. Firewalls are a good way to filter through any potential malware or attacks to the network. The firewall essentially acts as a filter and allows what data is supposed to come through while preventing data that shouldn’t. These methods are beneficial to companies to help protect information on the network and prevent business losses due to technical issues and possible attacks. These are great ways to lower risk to a more acceptable level.

    -Jacob.

    in reply to: OCU C)SP B Week 03 Lesson 06 Discussion #99980
    Jacob Mannon
    Participant

    Some of the most common methods for storing data include direct attached storage, network attached storage, storage area network, and cloud storage. Direct attached storage would be used for immediate access to data. This would be like the hard drive on our computer. We have immediate access to it because it is stored on the device. Network attached storage is data that is kept within a network and requires access. Storage area networks are multiple devices that contain the data. This could be used in a RAID setup across multiple servers. Cloud storage is data kept in a cloud server. Examples of these would be ICloud, Oracle, and Microsoft Onedrive.

    -Jacob

Viewing 15 posts - 1 through 15 (of 58 total)

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.